Table of Contents

Server: Anti-Throttle and Anti-Hacking

Protocol Overview

TapeTrack uses a compressed and encrypted binary protocol to communicate between clients and servers.

When a TapeTrack Server is exposed to the internet, it is common for unauthorized connection attempts to occur. These are typically automated scans from hackers who are unaware they’re targeting a TapeTrack service. For example, a server running on port 5000 may be mistaken for:

Although unauthorized access is extremely difficult due to TapeTrack’s protocol and encryption, repeated connection attempts can consume server resources.

Connection Handling Strategy

TapeTrack implements a lightweight defense mechanism to reduce impact from non-compliant clients:

Once an IP address (or gateway) sends a non-TapeTrack packet, all future connections from that IP during the time-out period will be accepted but terminated immediately.

Advanced Linux Integration: eBPF Support

On Linux systems, TapeTrack can integrate with eBPF for kernel-level IP blocking.

To enable this:

Further Reading

For setup instructions and eBPF integration steps, refer to the eBPF Configuration Technote.